DocumentCode
3147166
Title
An optimized Kerberos authentication protocol
Author
El-Emam, Eman ; Koutb, Magdy ; Kelash, Hamdy ; Allah, Osama Farag
Author_Institution
Egyptian Space Program, Nat. Authority for Remote Sensing & Space Sci., Cairo, Egypt
fYear
2009
fDate
14-16 Dec. 2009
Firstpage
508
Lastpage
513
Abstract
This paper will introduce simple modifications to the database of the widely deployed Kerberos authentication protocol. The principle´s long-term secret key will be independent of the user password with the aim to overcome the weak passwords chosen by the network principal that are susceptible to password guessing attacks, the main drawback of the Kerberos protocol. Instead, the Kerberos Distribution Center will save a profile for every instance in the realm that it mange and the secret key will be generated based on that profile. This profile will be hashed and then, the output digest will be encrypted to generate the secret key. Besides, the lifetime of the secret key will be controlled using the system lifetime. We will use Triple-Des as an encryption algorithm, SHA-256 as a hashing algorithm, and Blum Blum Shub as a random number generator algorithm.
Keywords
authorisation; cryptographic protocols; random number generation; Blum Blum Shub; Kerberos distribution center; SHA-256; Triple-Des encryption algorithm; hashing algorithm; optimized Kerberos authentication protocol; password guessing attacks; random number generator algorithm; secret key; Access control; Access protocols; Authentication; Authorization; Computer networks; Computer security; Control systems; Cryptography; Databases; Public key; Access control; Kerberos; authentication protocols; authorization; computer network security;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Engineering & Systems, 2009. ICCES 2009. International Conference on
Conference_Location
Cairo
Print_ISBN
978-1-4244-5842-4
Electronic_ISBN
978-1-4244-5843-1
Type
conf
DOI
10.1109/ICCES.2009.5383213
Filename
5383213
Link To Document